Chapter 10
Authentication
CERTIFICATION OBJECTIVES
10.01 Identifying Authentication Models
10.02 Authentication Protocols
10.03 Implementing Authentication
An important consideration for all security programs is how approved individuals identify themselves to different systems and how that information is used to verify that the individuals are who they say they are. The process of verifying the identity of an individual is known as authentication. Before employees in an organization can gain access to ...
Get CompTIA Security+ Certification Study Guide, Third Edition (Exam SY0-501), 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.